US20100265845A1 - Wireless Local Area Network, Adapter Unit and Equipment - Google Patents
Wireless Local Area Network, Adapter Unit and Equipment Download PDFInfo
- Publication number
- US20100265845A1 US20100265845A1 US11/991,965 US99196506A US2010265845A1 US 20100265845 A1 US20100265845 A1 US 20100265845A1 US 99196506 A US99196506 A US 99196506A US 2010265845 A1 US2010265845 A1 US 2010265845A1
- Authority
- US
- United States
- Prior art keywords
- network
- local area
- area network
- access point
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/088—Access security using filters or firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Definitions
- the invention relates to a wireless local area network.
- a wireless local area network refers to a local area network of a restricted area such as an office, an airport or a hotel, to which the customer terminals within the area are connected wirelessly through the radio path.
- the most common WLAN standard is the IEEE 802.11 and the different versions thereof.
- a wireless local area network typically replaces or extends a wired local area network. If both a wired and a wireless local area network are employed in an office, the employees may continue to use the applications and information in the network in the wireless local area network when moving from one work place to another.
- a wireless local area network is formed of one or more access points (AP), and of a wireless or wired network that interconnects the access points, and of other active devices, which control the traffic within the network or through a firewall to the Internet.
- Mobile terminals which currently still refer mainly to portable computers, communicate over the radio path with the nearest access point.
- a wireless local area network currently employs a 2.4 GHz frequency.
- the terminal In order to be able to connect a wireless terminal to a wireless local area network, the terminal must be provided with a WLAN card, and if the network is public, then the user also has to have a subscription to the service provider.
- Mobile telephone manufacturers and network interface card manufacturers make WLAN cards and the cards may either be external ones or integrated into the device.
- WLAN cards may either be external ones or integrated into the device.
- PDA personal digital assistants
- Unprotected a wireless local area network poses a threat to the security of the network, and therefore the computer connected to the wireless local area network is to be secured in the same way as a computer attached to a wired local area network.
- the computer should be provided with a security updated operating system, real-time antivirus software and a firewall.
- the communications on radio channels provide a special challenge for the security of a wireless local area network. Basically anyone is able to passively pick up a signal transmitted over the radio path and many are those who are capable of actively disturbing the WLAN.
- the wireless local area network is particularly susceptible to eavesdropping, to block a service and to unauthorized use of the network.
- the access point When the WLAN device is brought to the service area of the access point, or it is switched on again, it has to be connected to the access point.
- the connection requires that the device obtains information about the operation of the network. Therefore the access point sends at predetermined intervals messages including traffic information, i.e. beacon messages.
- traffic information i.e. beacon messages.
- These messages typically include in unencrypted form also the name, i.e. a Service Set ID (SSID), of the common network of the devices in the WLAN subsystem that is used for logically segmenting the subsystem concerned.
- SSID Service Set ID
- the WLAN device When the WLAN device is provided with a sufficient amount of information in order to participate in the network traffic, the device starts authentication that is either open or is based on a private key and a challenge-response procedure.
- the WLAN device and the access point have to be provided with the same SSID in order to be able to establish a connection, and the access point prevents access from customer terminals, which are not provided with the SSID.
- security is poor, since the access point continuously sends the SSID in plain text. Even though sending the SSID would be disabled, an intruder or a hacker may find out the SSID by “snooping”, i.e. monitoring the network traffic unnoticed.
- Shared key authentication is more secure.
- the aim of this process is to ensure that both parties are aware of the same common private key.
- the access point requests the WLAN device to encrypt the message before transmission, and the received message is decrypted at the access point end.
- the security scheme of the IEEE 802.11 standard aims to create such conditions that primarily provide the same security as a conventional wired local area network. The object is not to achieve security that spans the entire data connection; instead information is to be protected on the radio path.
- WEP Wired Equivalent Privacy
- the RC4 is a symmetric encryption method, where decryption is carried out with the same private WEP key used for encryption.
- the most significant problem with symmetric encryption is the exchange of private key between parties.
- the WEP key is input into each computer during the installation of a network interface card, whereby the encryption depends on the reliability of each user.
- Wi-Fi Protected Access Wi-Fi Protected Access
- TKIP protocol Temporal Key Integrity Protocol
- AES Advanced Encryption Standard
- DES Data Encryption Standard
- 3DES Triple DES
- Some WLAN manufacturers support authentication based on the physical MAC address of the client's network adapter. The access point allows a connection for the client only if the client's MAC address corresponds with the address in the authentication table of the access point. In addition, authentication servers etc, have been employed.
- a WLAN device When a WLAN device is authenticated it is authorized to participate in the operation of the network, and association is started. At this stage the parties exchange information about their abilities, and the network registers the location of the WLAN station. When association is carried out the WLAN device may start transferring data in the network.
- the most typical and known is the private wireless local area network used in companies.
- the portable computers of the employees of a company communicate with the internal network of the company through an access point.
- a firewall is provided between the access point and the internal wired network of the company.
- the internal wired network is connected to a router, which in turn controls the traffic between the internal network of the company and the Internet.
- a firewall is also provided between the internal network of the company and the external Internet.
- City networks and “hot spots” are public wireless local area networks.
- the hot spots are wireless local area networks provided in certain public premises, through which access to the Internet is possible.
- a hot spot may be similar to an internal wireless network of an office except that anyone may buy a subscription to a public wireless local area network.
- Hot spots are found for instance at airports, in hotels and in conference centres.
- Public wireless local area networks provide access to the open internet. If the user desires to utilize the connection for telecommuting he/she should be provided with a separate data security solution, such as a virtual private network (VPN).
- VPN virtual private network
- What becomes a problem is to arrange different subscriptions, services and network resources in wireless networks of hot spot type in a way that prevents unauthorized access to the network, provides a secure connection to the users and allows special services for the users, while the adoption and installation of the subscription is easy for the user and possible to implement directly in most computers or corresponding customer terminals.
- the object of the invention is achieved with a wireless local area network, an adapter unit and equipment, characterized in what is disclosed in the independent claims.
- the preferred embodiments of the invention are disclosed in the dependent claims.
- a service provider of a wireless local area network or another apparatus supplier delivers an apparatus to a customer, a so-called network adapter unit comprising a wireless network adapter part that the service provider or the other apparatus supplier has in advance configured to be connected to the wireless network through a particular access point or particular access points, which provide a predetermined service or services, and a wired network adapter part to be connected to a wired network interface of the customer terminal.
- the customer terminal can preferably not be used to change or read configuration data.
- Each access point is configured to allow access to the wireless local area network that takes place only through the compatibly configured adapter unit.
- the service of the customer terminal is determined on the basis of the access point that the network adapter unit connected thereto employs.
- the network adapter unit forms, in accordance with the principles of an embodiment of the invention, a part of the wireless local area network controlled by the service provider, even though the network adapter unit is handed over to the customer when used.
- the customer obtains a device provided with a wired network interface with predetermined properties that the customer is not able to change.
- the wireless network on the other side of the network adapter remains transparent to the customer terminal; the customer terminal operates as if connected to the wired network. Consequently the customer is not requested to carry out any specific configuration measures as would be the case if the customer terminal were connected to a wireless local area network using a conventional wireless local area network adapter.
- the invention provides an easy way to obtain a secure wireless local area network connection with the desired service concept.
- the invention allows offering tailor-made and secure local area network subscriptions and services to different users even for short periods of time.
- the customer is provided with a subscription and service when he/she receives the network adapter unit, and the customer loses them when he/she returns the adapter unit. Since the information associated with the access to a wireless network is maintained within the network adapter unit and unattainable from the customer, information that is critical regarding the security of the network is not delivered to the customer.
- the service obtained by the customer is determined according to the adapter unit that has been handed over, in which case the different services can easily be charged using different adapter unit rents.
- the present invention is particularly advantageous in situations, where the customer needs a secure and protected network subscription or network resource for temporary use.
- a network access and network resources may be provided for participants of conferences, meetings, fairs and other occasions.
- the access point and each adapter unit are compatibly configured in advance by the equipment supplier to be wirelessly and securely connected only with each other.
- the customer is provided with equipment that forms a complete secured local area network.
- the wireless local area network on the other side of the network adapter remains transparent to the customer terminal, and the customer terminal operates as if connected to a wired network. No specific configuration measures are therefore required of the customer as would be the case if a wireless network were formed in a conventional manner of discrete components and the customer terminal were to be connected to the network by means of a conventional local area network adapter delivered with a computer.
- the invention enables to easily set up a secure wireless local area network.
- the secured local area network apparatus that is configured in advance according to the invention is particularly advantageous for establishing a small local area network at home or at the office.
- FIG. 1 shows an example of a wireless local area network implemented in accordance with the principles of the invention.
- the invention can be applied in different types of wireless local area networks.
- a wireless local area network according to the IEEE 802 recommendations is used as an example, however, without limiting the invention thereto.
- the technical properties, requirements and implementations of the WLAN used as an example are all explained in more detail in the recommendations IEEE 802.11b and IEEE 802.11g.
- FIG. 1 shows an example of a wireless local area network applying the principles of the present invention.
- the wireless local area network comprises network adapter units 2 A to 2 G and access points (AP) 3 , 4 A, 4 B, 4 C and 5 , which are connected to a larger network infrastructure 100 .
- the network infrastructure 100 symbolically represents any network configuration of a service provider that provides the desired services and/or offers the desired network resources for the customer terminals, e.g. workstations WS 1 to WS 7 .
- the network infrastructure comprises switches 6 A, 6 B, 6 C and 6 D, a router 9 and servers 7 , 8 .
- the wireless local area network infrastructure 100 which may form for instance an intranet, preferably comprises a gateway to a wide area network (WAN) 10 , i.e. the Internet.
- WAN wide area network
- the customer terminal e.g. the workstation WS 1 to WS 7
- a wired network adapter such as an Ethernet network interface card.
- Most computers are currently delivered with a network interface card, whereby they can be directly connected to a wired network without requiring any measures carried out by the user.
- Each network adapter unit 2 A to 2 G may comprise a wireless local area network (WLAN) adapter part 21 and a wired local area network (LAN) adapter part 22 .
- the LAN adapter part 22 forms a wired network interface (for instance Ethernet) to the customer terminal WS 1 to WS 7 .
- the unit 2 A to 2 G has the power supplied for instance from a battery, an external power source, through a network interface from the network interface card of the cu stomer terminal (for instance PoE, Power over Ethernet) or from a USB connector in the customer terminal.
- the customer terminal WS 1 to WS 7 may be connected to the LAN adapter part 22 with a conventional network cable or in a wireless manner, using for instance Bluetooth, infrared or another short range wireless technique.
- the network adapter unit 2 A to 2 G is similar to any wired network access point.
- the WLAN adapter part 21 is connected to the infrastructure 100 of the wireless local area network with the secured WLAN connection (IEEE 802.11) through an access point (AP) 3 , 4 A, 4 B, 4 C or 5 (also referred to as a base station).
- AP access point
- AP access point
- 4 A, 4 B, 4 C or 5 also referred to as a base station
- Data traffic arriving to the LAN adapter part 22 from the customer terminal is transmitted within the adapter unit 2 A to 2 G to the WALN adapter part 21 , which forwards the data traffic in secured mode to the access point (AP) 3 , 4 A, 4 B, 4 C or 5 .
- the security of the data traffic received from the access point (AP) 3 , 4 A, 4 B, 4 C or 5 is removed (e.g. decrypted) and the data traffic is transmitted through the LAN adapter part 22 to the customer terminal.
- the wireless network adapter units 2 A to 2 G are configured in advance before the units are delivered to the user.
- the network adapter unit 2 A to 2 G may be provided with a graphical user interface or a command line based user interface, for instance through the LAN adapter part.
- unauthorized use of the user interface is not possible for the user of the customer terminal 2 A to 2 G and access to the configuration data of the network adapter unit may be possible only by means of, for instance, a password or another appropriate technique.
- a fixed configuration may also be provided in the adapter unit.
- the network adapter unit 2 A to 2 G is, in accordance with the principles of an embodiment of the invention, a part of a wireless local area network controlled by the service provider, even though the network adapter unit is handed over to the customer when used.
- the customer obtains a device provided with a network subscription with predetermined properties, which the customer is unable to change himself/herself.
- the wireless local area network on the other side of the network adapter 2 A to 2 G remains transparent to the customer terminal, the customer terminal operates as if connected to a wired network. Consequently no particular configuration measures are required of the customer as would be the case if the customer terminal were connected to a wireless local area network using a conventional WLAN adapter.
- the invention provides an easy way to establish a secure wireless local area network connection with the desired service concept.
- the invention also provides an easy way to establish a secured local area network controlled by the customer himself/herself.
- the supplier such as the equipment manufacturer or vendor
- the equipment package comprising an access point and a desired number of adapter units configures the access point and each adapter unit so as to be compatible for a secure wireless communication only with each other.
- the customer obtains the equipment, which establishes a ready-to-use secured local area network.
- the wired network interface of the adapter unit is connected to the customer terminal, such as a computer.
- the access point is connected to a desired target, for instance to provide an Internet connection.
- the wireless local area network behind the network adapter remains transparent to the customer terminal, the customer terminal operates as if connected to the wired network.
- the invention provides a simple and easy way to establish a secure wireless local area network without requiring a more specific knowledge of the local area network.
- the customer only needs to buy a ready configured equipment package provided with the desired number of compatibly configured adapter units and access points. Different equipment packages are independent of one another and secured from each other.
- the local area network equipment according to the invention that is configured and secured in advance is particularly advantageous for establishing a small local area network at home or at the office.
- the invention enables to provide tailor-made and secure local area network subscriptions for different users even for short periods of time.
- the customer obtains a network adapter unit when he/she receives the subscription and the service and loses them when he/she returns the adapter unit. Since information associated with access to the wireless network is maintained within the network adapter unit and remains unreachable for the customer, information that is critical to the security of the network is therefore not delivered to the customer.
- the configuration of the network adapter unit 2 A to 2 G may comprise for instance the following information.
- the user interface of the unit may be provided with a user identification and a password, which allow examining and/or changing the settings of the adapter unit later.
- the service provider may provide the system software of the WLAN adapter part 21 in advance with a name of the wireless network to be used (SSID), an encryption key index of the network, an encryption algorithm or method to be used (for instance WEP, WPA, WPA-PSK, DES, 3DES, AES), an encryption key and a radio channel to be used. Alternatively the selection of channel can be carried out automatically.
- the settings are defined according to the fact in which access point (AP) 3 , 4 A, 4 B, 4 C or 5 the customer terminal WS 1 to WS 7 of the user of the network adapter unit is to be logged. Different services may be provided through the different access points (AP) 3 , 4 A, 4 B, 4 C or 5 .
- DHCP Dynamic Host Configuration Protocol
- the service provider of the system in this case the wireless local area network 100 , provides an IP address area for the HDCP and each customer terminal WS 1 to WS 8 includes TCP/IP software requesting the IP address from the DHCP server.
- TCP/IP Transmission Control Protocol
- the server 7 is a DHCP server that distributes the information concerned to the customer terminals 2 A to 2 G via the intranet, the switches 6 A to 6 D, the access point (AP) 3 , 4 A, 4 B, 4 C, 5 and the network adapter unit 2 A to 2 G.
- the server 7 itself may also operate as the DNS and/or WINS server and resolve the name (DNS, WINS) of the intranet resources or resolve (DNS) Internet addresses.
- the system software of the LAN adapter part 21 may configure it to distribute the IP address, the subnetwork mask and the default gateway and the name servers (DNS) and WINS servers automatically (DHCP) to the customer terminal connected thereto. In a way the adapter part 21 thus operates as the DHCP server.
- the network adapter unit according to the invention may be implemented, for instance, using an access point DWL-730AP of the D-Link Systems Inc, the Ethernet interface of which receives a network cable of the customer terminal and is powered from the USB connector of the customer terminal.
- the service provider configures the DWL-730AP to operate in accordance with the principles of the invention.
- the network infrastructure 100 comprises controllable network switches 6 A to 6 D, which are used to connect the access points (AP) 3 , 4 A, 4 B, 4 C and 5 of the wireless network with each other and/or to different services offered in the network and/or to the Internet 10 .
- What is defined for the network adapter of the local area network side of the router 9 is a fixed IP address, which operates as the default gateway of the wireless customer terminals WS 1 to WS 7 to the Internet 10 .
- the network adapter of the external network 10 of the router 9 automatically (DHCP) retrieves the IP address and the addresses of the name server from the network of the service provider. Alternatively they can be inputted into the router manually.
- the router may also comprise a firewall and services corresponding to the DHCP, DHS, WINS, file and/or resource servers 7 and 8 .
- the maximum speed of the ports of the different switches 6 A to 6 D can be limited, in which case Internet connections operating at different speeds may be offered to be used by the customer terminals WS 1 to WS 7 according to the access point through which the connection is established.
- virtual networks VLAN may be created in the switch network, the virtual networks enabling access to some or all of these services.
- the service provided in addition to the Internet service is a file and resource server 8 , from which shared disk resources, the right of use of software or other services can be assigned to different users.
- An example of an appropriate router 9 is a DFL-700 of the D-Link Systems Inc, which comprises a firewall and a router, which employs the DHCP for distributing IP addresses.
- Each access point (AP) 3 , 4 A, 4 B, 4 C and 5 is fixedly connected to a port in one of the switches 6 A to 6 D of the network infrastructure 100 .
- the system software of the access point 3 is provided with a user name and a password, which allow checking and/or changing the settings of the access point later through the user interface.
- What is also inputted in advance into the system software is a name of the wireless network to be used (SSID), an encryption key index of the network, an encryption algorithm or method to be used (for example WEP, WPA, WPA-PSK, DES, 3DES or AES), an encryption key and the radio channel to be used. Alternatively the selection of channel can be set to take place automatically.
- the settings are defined according to the customer terminals, which are to be logged in to this particular access point, or according to the services, which are to be provided through the access point.
- the network name (SSID) can also be hidden in order to improve data security. If the wired network adapter part 22 in the network adapter unit 2 A to 2 G is used to automatically distribute the IP address, the sub-network mask, the default gateway, the name servers and/or the WINS servers to the customer terminal connected thereto, then the access point may employ a MAC filter, in which case only the predetermined network adapter units with matching MAC addresses can access to the access point 110 or to the network infrastructure 100 through the access point.
- An example of an appropriate access point (AP) 3 , 4 A, 4 B, 4 C and 5 is the DWL-2100SP of the D-Link Systems Inc.
- the network adapter units 2 A and 2 B are configured such that they are logged in the access point (AP) 3 or in another similarly configured access point.
- the adapter units 2 A and 2 B as well as the access point (AP) 3 thus form a pre-configured equipment package.
- the access point (AP) 3 is in turn connected to a port at the switch 6 A of the network infrastructure 100 .
- the switches of the infrastructure 100 are configured such that the customer terminals WS 1 and WS 2 , which have a wireless connection through the network adapter units 2 A and 2 B to the access point 3 may have access to the disk or other network resources with a separate server 8 and to the Internet connection through a router 9 .
- the access points (AP) 4 A, 4 B and 4 C are configured identically among one another.
- the network adapter units 2 C, 2 D, 2 E and 2 F are configured such that they may be logged in the access points (AP) 4 A, 4 B and 4 C or in other correspondingly configured access points.
- the access point 4 A is connected to a port at the switch 6 A
- the access point 4 B is connected to a port at the switch 6 B
- the access point 4 C is connected to a port at the switch 6 C.
- the switches of the infrastructure 100 are configured such that the customer terminals WS 3 to WS 6 having wireless connection through the network adapter units 2 C, 2 D, 2 E and 2 F to the access points 4 A, 4 B and 4 C have access to the Internet only through the router 9 .
- the network adapter 2 G is configured such that it is logged in the access point (AP) 5 or in another similarly configured access point.
- the access point (AP) 5 is in turn connected to a port at the switch 6 C.
- the switches of the infrastructure 100 are configured such that the customer terminal WS 7 , which is wirelessly connected through the network adapter units 2 A and 2 B to the access point 5 has access to the Internet at limited speed through the router 9 .
- the speed limitation of the Internet connection is set to the port of the switch 6 C or 6 D.
- the infrastructure shown in FIG. 1 can be provided with a new secured local area network by providing a new equipment package according to the invention comprising a compatibly configured access point and an adapter unit.
- a simple local area network infrastructure such as a home network, can be established using a single equipment package, for instance the adapter unit 2 A and 2 B and access point (AP) 3 .
- the access point is connected directly to the desired service or to the network, for instance with an ADSL modem to the Internet.
- the only measures required of the user are then connecting the network interface of the computer to the adapter unit and connecting the access point to the ADSL modem, for instance with a LAN cable. No configurations taking place in the computer are required.
- the wireless local area network according to the invention is preferably arranged to prevent connections between customer terminals and to allow only the connection from the customer terminal to the Internet or another service intended thereto.
- a customer terminal can preferably not observe presence of other terminals in the wireless local area network. These measures increase the security of the wireless local area network.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Small-Scale Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Equipment for a wireless local area network comprises at least one adapter unit (2A to 2G) including a wired network adapter part (22) to be connected to a wired network interface of a computer (WS1 to WS7) and a wireless network adapter part (21), and a wireless network access point (3, 4, 5). The access point (3, 4, 5) and the adapter unit are configured in advance by the supplier of the adapter unit to provide a secure wireless connection only with one another.
Description
- The invention relates to a wireless local area network.
- A wireless local area network (WLAN) refers to a local area network of a restricted area such as an office, an airport or a hotel, to which the customer terminals within the area are connected wirelessly through the radio path. The most common WLAN standard is the IEEE 802.11 and the different versions thereof. A wireless local area network typically replaces or extends a wired local area network. If both a wired and a wireless local area network are employed in an office, the employees may continue to use the applications and information in the network in the wireless local area network when moving from one work place to another.
- A wireless local area network is formed of one or more access points (AP), and of a wireless or wired network that interconnects the access points, and of other active devices, which control the traffic within the network or through a firewall to the Internet. Mobile terminals, which currently still refer mainly to portable computers, communicate over the radio path with the nearest access point. A wireless local area network currently employs a 2.4 GHz frequency.
- In order to be able to connect a wireless terminal to a wireless local area network, the terminal must be provided with a WLAN card, and if the network is public, then the user also has to have a subscription to the service provider. Mobile telephone manufacturers and network interface card manufacturers make WLAN cards and the cards may either be external ones or integrated into the device. Currently most of the devices employed in the wireless local area network are portable computers, but in the near future also other mobile stations utilizing WLAN and personal digital assistants (PDA) are likely to become common. In this description the various WLAN devices will be commonly referred to as customer terminals.
- Unprotected a wireless local area network poses a threat to the security of the network, and therefore the computer connected to the wireless local area network is to be secured in the same way as a computer attached to a wired local area network. The computer should be provided with a security updated operating system, real-time antivirus software and a firewall. The communications on radio channels provide a special challenge for the security of a wireless local area network. Basically anyone is able to passively pick up a signal transmitted over the radio path and many are those who are capable of actively disturbing the WLAN. The wireless local area network is particularly susceptible to eavesdropping, to block a service and to unauthorized use of the network.
- When the WLAN device is brought to the service area of the access point, or it is switched on again, it has to be connected to the access point. The connection requires that the device obtains information about the operation of the network. Therefore the access point sends at predetermined intervals messages including traffic information, i.e. beacon messages. These messages typically include in unencrypted form also the name, i.e. a Service Set ID (SSID), of the common network of the devices in the WLAN subsystem that is used for logically segmenting the subsystem concerned. When the WLAN device is provided with a sufficient amount of information in order to participate in the network traffic, the device starts authentication that is either open or is based on a private key and a challenge-response procedure. In the open authentication the WLAN device and the access point have to be provided with the same SSID in order to be able to establish a connection, and the access point prevents access from customer terminals, which are not provided with the SSID. However, security is poor, since the access point continuously sends the SSID in plain text. Even though sending the SSID would be disabled, an intruder or a hacker may find out the SSID by “snooping”, i.e. monitoring the network traffic unnoticed.
- Shared key authentication is more secure. The aim of this process is to ensure that both parties are aware of the same common private key. The access point requests the WLAN device to encrypt the message before transmission, and the received message is decrypted at the access point end. The security scheme of the IEEE 802.11 standard aims to create such conditions that primarily provide the same security as a conventional wired local area network. The object is not to achieve security that spans the entire data connection; instead information is to be protected on the radio path. The first version of the IEEE 802.11 standard concerning security is referred to as WEP (Wired Equivalent Privacy), which in addition to authentication covers securing the information to be transferred using an RC4 stream cipher. The RC4 is a symmetric encryption method, where decryption is carried out with the same private WEP key used for encryption. The most significant problem with symmetric encryption is the exchange of private key between parties. In general the WEP key is input into each computer during the installation of a network interface card, whereby the encryption depends on the reliability of each user.
- WEP encryption lost ground when a security hole was revealed, and therefore the IEEE 802.11g version employs a replacement technique WPA (Wi-Fi Protected Access), wherein a session-specific private key is provided and the private key is automatically exchanged using a TKIP protocol (Temporary Key Integrity Protocol). Examples of other substitute techniques include WPA-PSK, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple DES) etc. Some WLAN manufacturers support authentication based on the physical MAC address of the client's network adapter. The access point allows a connection for the client only if the client's MAC address corresponds with the address in the authentication table of the access point. In addition, authentication servers etc, have been employed.
- When a WLAN device is authenticated it is authorized to participate in the operation of the network, and association is started. At this stage the parties exchange information about their abilities, and the network registers the location of the WLAN station. When association is carried out the WLAN device may start transferring data in the network.
- Three main types of different wireless local area networks exist. The most typical and known is the private wireless local area network used in companies. Here the portable computers of the employees of a company communicate with the internal network of the company through an access point. Often a firewall is provided between the access point and the internal wired network of the company. The internal wired network is connected to a router, which in turn controls the traffic between the internal network of the company and the Internet. Generally a firewall is also provided between the internal network of the company and the external Internet. City networks and “hot spots” are public wireless local area networks. The hot spots are wireless local area networks provided in certain public premises, through which access to the Internet is possible. Technically a hot spot may be similar to an internal wireless network of an office except that anyone may buy a subscription to a public wireless local area network. Hot spots are found for instance at airports, in hotels and in conference centres. Public wireless local area networks provide access to the open internet. If the user desires to utilize the connection for telecommuting he/she should be provided with a separate data security solution, such as a virtual private network (VPN).
- What becomes a problem is to arrange different subscriptions, services and network resources in wireless networks of hot spot type in a way that prevents unauthorized access to the network, provides a secure connection to the users and allows special services for the users, while the adoption and installation of the subscription is easy for the user and possible to implement directly in most computers or corresponding customer terminals.
- It is an object of the invention to provide a new solution for providing a wireless local area network subscription to users, particularly in a wireless network of hot spot type.
- The object of the invention is achieved with a wireless local area network, an adapter unit and equipment, characterized in what is disclosed in the independent claims. The preferred embodiments of the invention are disclosed in the dependent claims.
- In accordance with an embodiment of the invention a service provider of a wireless local area network or another apparatus supplier delivers an apparatus to a customer, a so-called network adapter unit comprising a wireless network adapter part that the service provider or the other apparatus supplier has in advance configured to be connected to the wireless network through a particular access point or particular access points, which provide a predetermined service or services, and a wired network adapter part to be connected to a wired network interface of the customer terminal. The customer terminal can preferably not be used to change or read configuration data. Each access point is configured to allow access to the wireless local area network that takes place only through the compatibly configured adapter unit. Furthermore the service of the customer terminal is determined on the basis of the access point that the network adapter unit connected thereto employs.
- Thus the network adapter unit forms, in accordance with the principles of an embodiment of the invention, a part of the wireless local area network controlled by the service provider, even though the network adapter unit is handed over to the customer when used. The customer obtains a device provided with a wired network interface with predetermined properties that the customer is not able to change. The wireless network on the other side of the network adapter remains transparent to the customer terminal; the customer terminal operates as if connected to the wired network. Consequently the customer is not requested to carry out any specific configuration measures as would be the case if the customer terminal were connected to a wireless local area network using a conventional wireless local area network adapter. As regards the customer, the invention provides an easy way to obtain a secure wireless local area network connection with the desired service concept.
- For the service provider the invention allows offering tailor-made and secure local area network subscriptions and services to different users even for short periods of time. The customer is provided with a subscription and service when he/she receives the network adapter unit, and the customer loses them when he/she returns the adapter unit. Since the information associated with the access to a wireless network is maintained within the network adapter unit and unattainable from the customer, information that is critical regarding the security of the network is not delivered to the customer. The service obtained by the customer is determined according to the adapter unit that has been handed over, in which case the different services can easily be charged using different adapter unit rents. The present invention is particularly advantageous in situations, where the customer needs a secure and protected network subscription or network resource for temporary use. Such a need arises for instance when sports editors attend sporting events; the invention allows the sports editors to communicate with their editorial staff directly from the stand without having to be near a wired network interface in a media room. Correspondingly a network access and network resources may be provided for participants of conferences, meetings, fairs and other occasions.
- In equipment according to an embodiment of the invention comprising an access point and a desired amount of adapter units, the access point and each adapter unit are compatibly configured in advance by the equipment supplier to be wirelessly and securely connected only with each other. The customer is provided with equipment that forms a complete secured local area network. The wireless local area network on the other side of the network adapter remains transparent to the customer terminal, and the customer terminal operates as if connected to a wired network. No specific configuration measures are therefore required of the customer as would be the case if a wireless network were formed in a conventional manner of discrete components and the customer terminal were to be connected to the network by means of a conventional local area network adapter delivered with a computer. For the user the invention enables to easily set up a secure wireless local area network. The secured local area network apparatus that is configured in advance according to the invention is particularly advantageous for establishing a small local area network at home or at the office.
- In the following the invention will be explained in greater detail by means of the preferred embodiments with reference to the accompanying drawing, in which
FIG. 1 shows an example of a wireless local area network implemented in accordance with the principles of the invention. - The invention can be applied in different types of wireless local area networks. In the following description a wireless local area network according to the IEEE 802 recommendations is used as an example, however, without limiting the invention thereto. The technical properties, requirements and implementations of the WLAN used as an example are all explained in more detail in the recommendations IEEE 802.11b and IEEE 802.11g.
-
FIG. 1 shows an example of a wireless local area network applying the principles of the present invention. The wireless local area network comprisesnetwork adapter units 2A to 2G and access points (AP) 3, 4A, 4B, 4C and 5, which are connected to alarger network infrastructure 100. Thenetwork infrastructure 100 symbolically represents any network configuration of a service provider that provides the desired services and/or offers the desired network resources for the customer terminals, e.g. workstations WS1 to WS7. In the example shown inFIG. 1 , the network infrastructure comprisesswitches router 9 andservers area network infrastructure 100, which may form for instance an intranet, preferably comprises a gateway to a wide area network (WAN) 10, i.e. the Internet. - The customer terminal, e.g. the workstation WS1 to WS7, may be any portable or other computer or corresponding device (a Gameboy, a printer, a PDA etc.) comprising a wired network adapter, such as an Ethernet network interface card. Most computers are currently delivered with a network interface card, whereby they can be directly connected to a wired network without requiring any measures carried out by the user.
- Each
network adapter unit 2A to 2G may comprise a wireless local area network (WLAN)adapter part 21 and a wired local area network (LAN)adapter part 22. TheLAN adapter part 22 forms a wired network interface (for instance Ethernet) to the customer terminal WS1 to WS7. Theunit 2A to 2G has the power supplied for instance from a battery, an external power source, through a network interface from the network interface card of the cu stomer terminal (for instance PoE, Power over Ethernet) or from a USB connector in the customer terminal. The customer terminal WS1 to WS7 may be connected to theLAN adapter part 22 with a conventional network cable or in a wireless manner, using for instance Bluetooth, infrared or another short range wireless technique. As regards the customer terminal, thenetwork adapter unit 2A to 2G is similar to any wired network access point. TheWLAN adapter part 21 is connected to theinfrastructure 100 of the wireless local area network with the secured WLAN connection (IEEE 802.11) through an access point (AP) 3, 4A, 4B, 4C or 5 (also referred to as a base station). Data traffic arriving to theLAN adapter part 22 from the customer terminal is transmitted within theadapter unit 2A to 2G to theWALN adapter part 21, which forwards the data traffic in secured mode to the access point (AP) 3, 4A, 4B, 4C or 5. Correspondingly the security of the data traffic received from the access point (AP) 3, 4A, 4B, 4C or 5 is removed (e.g. decrypted) and the data traffic is transmitted through theLAN adapter part 22 to the customer terminal. - In accordance with an embodiment of the invention the wireless
network adapter units 2A to 2G are configured in advance before the units are delivered to the user. For configuration thenetwork adapter unit 2A to 2G may be provided with a graphical user interface or a command line based user interface, for instance through the LAN adapter part. However, unauthorized use of the user interface is not possible for the user of thecustomer terminal 2A to 2G and access to the configuration data of the network adapter unit may be possible only by means of, for instance, a password or another appropriate technique. A fixed configuration may also be provided in the adapter unit. Thus, thenetwork adapter unit 2A to 2G is, in accordance with the principles of an embodiment of the invention, a part of a wireless local area network controlled by the service provider, even though the network adapter unit is handed over to the customer when used. The customer obtains a device provided with a network subscription with predetermined properties, which the customer is unable to change himself/herself. The wireless local area network on the other side of thenetwork adapter 2A to 2G remains transparent to the customer terminal, the customer terminal operates as if connected to a wired network. Consequently no particular configuration measures are required of the customer as would be the case if the customer terminal were connected to a wireless local area network using a conventional WLAN adapter. As regards the user, the invention provides an easy way to establish a secure wireless local area network connection with the desired service concept. - The invention also provides an easy way to establish a secured local area network controlled by the customer himself/herself. During manufacture, or at sale or delivery the supplier (such as the equipment manufacturer or vendor) of the equipment package comprising an access point and a desired number of adapter units configures the access point and each adapter unit so as to be compatible for a secure wireless communication only with each other. The customer obtains the equipment, which establishes a ready-to-use secured local area network. The wired network interface of the adapter unit is connected to the customer terminal, such as a computer. The access point is connected to a desired target, for instance to provide an Internet connection. The wireless local area network behind the network adapter remains transparent to the customer terminal, the customer terminal operates as if connected to the wired network. Thus, no particular configuration measures are required of the customer for setting up a wireless local area network as would be the case if the customer terminal were to be connected to a wireless local area network, which is set up using separately delivered components, such as a wireless base station and an integrated local area network adapter of the computer. As regards the customer, the invention provides a simple and easy way to establish a secure wireless local area network without requiring a more specific knowledge of the local area network. The customer only needs to buy a ready configured equipment package provided with the desired number of compatibly configured adapter units and access points. Different equipment packages are independent of one another and secured from each other. The local area network equipment according to the invention that is configured and secured in advance is particularly advantageous for establishing a small local area network at home or at the office.
- For a service provider the invention enables to provide tailor-made and secure local area network subscriptions for different users even for short periods of time. The customer obtains a network adapter unit when he/she receives the subscription and the service and loses them when he/she returns the adapter unit. Since information associated with access to the wireless network is maintained within the network adapter unit and remains unreachable for the customer, information that is critical to the security of the network is therefore not delivered to the customer.
- The configuration of the
network adapter unit 2A to 2G may comprise for instance the following information. The user interface of the unit may be provided with a user identification and a password, which allow examining and/or changing the settings of the adapter unit later. The service provider may provide the system software of theWLAN adapter part 21 in advance with a name of the wireless network to be used (SSID), an encryption key index of the network, an encryption algorithm or method to be used (for instance WEP, WPA, WPA-PSK, DES, 3DES, AES), an encryption key and a radio channel to be used. Alternatively the selection of channel can be carried out automatically. The settings are defined according to the fact in which access point (AP) 3, 4A, 4B, 4C or 5 the customer terminal WS1 to WS7 of the user of the network adapter unit is to be logged. Different services may be provided through the different access points (AP) 3, 4A, 4B, 4C or 5. - What is defined in the wired local area network (LAN)
adapter part 21 for thenetwork adapter unit 2A to 2G is a static IP address, a sub-network mask, and a default gateway and name servers (DNS) and WINS servers to be used if necessary. These variables can alternatively be retrieved automatically (DHCP) through the wireless localarea network infrastructure 100. The DHCP (Dynamic Host Configuration Protocol) is a protocol that is used for allocating a dynamic IP address. The service provider of the system, in this case the wirelesslocal area network 100, provides an IP address area for the HDCP and each customer terminal WS1 to WS8 includes TCP/IP software requesting the IP address from the DHCP server. In the example shown inFIG. 1 theserver 7 is a DHCP server that distributes the information concerned to thecustomer terminals 2A to 2G via the intranet, theswitches 6A to 6D, the access point (AP) 3, 4A, 4B, 4C, 5 and thenetwork adapter unit 2A to 2G. Theserver 7 itself may also operate as the DNS and/or WINS server and resolve the name (DNS, WINS) of the intranet resources or resolve (DNS) Internet addresses. In an embodiment of the invention, the system software of theLAN adapter part 21 may configure it to distribute the IP address, the subnetwork mask and the default gateway and the name servers (DNS) and WINS servers automatically (DHCP) to the customer terminal connected thereto. In a way theadapter part 21 thus operates as the DHCP server. The network adapter unit according to the invention may be implemented, for instance, using an access point DWL-730AP of the D-Link Systems Inc, the Ethernet interface of which receives a network cable of the customer terminal and is powered from the USB connector of the customer terminal. The service provider configures the DWL-730AP to operate in accordance with the principles of the invention. - In the example shown in
FIG. 1 , thenetwork infrastructure 100 comprises controllable network switches 6A to 6D, which are used to connect the access points (AP) 3, 4A, 4B, 4C and 5 of the wireless network with each other and/or to different services offered in the network and/or to theInternet 10. What is defined for the network adapter of the local area network side of therouter 9 is a fixed IP address, which operates as the default gateway of the wireless customer terminals WS1 to WS7 to theInternet 10. The network adapter of theexternal network 10 of therouter 9 automatically (DHCP) retrieves the IP address and the addresses of the name server from the network of the service provider. Alternatively they can be inputted into the router manually. The router may also comprise a firewall and services corresponding to the DHCP, DHS, WINS, file and/orresource servers different switches 6A to 6D can be limited, in which case Internet connections operating at different speeds may be offered to be used by the customer terminals WS1 to WS7 according to the access point through which the connection is established. In an embodiment, virtual networks (VLAN) may be created in the switch network, the virtual networks enabling access to some or all of these services. In the example shown inFIG. 1 , the service provided in addition to the Internet service is a file andresource server 8, from which shared disk resources, the right of use of software or other services can be assigned to different users. An example of anappropriate router 9 is a DFL-700 of the D-Link Systems Inc, which comprises a firewall and a router, which employs the DHCP for distributing IP addresses. - Each access point (AP) 3, 4A, 4B, 4C and 5 is fixedly connected to a port in one of the
switches 6A to 6D of thenetwork infrastructure 100. The system software of theaccess point 3 is provided with a user name and a password, which allow checking and/or changing the settings of the access point later through the user interface. What is also inputted in advance into the system software, for instance through the service provider or the apparatus manufacturer, is a name of the wireless network to be used (SSID), an encryption key index of the network, an encryption algorithm or method to be used (for example WEP, WPA, WPA-PSK, DES, 3DES or AES), an encryption key and the radio channel to be used. Alternatively the selection of channel can be set to take place automatically. The settings are defined according to the customer terminals, which are to be logged in to this particular access point, or according to the services, which are to be provided through the access point. The network name (SSID) can also be hidden in order to improve data security. If the wirednetwork adapter part 22 in thenetwork adapter unit 2A to 2G is used to automatically distribute the IP address, the sub-network mask, the default gateway, the name servers and/or the WINS servers to the customer terminal connected thereto, then the access point may employ a MAC filter, in which case only the predetermined network adapter units with matching MAC addresses can access to the access point 110 or to thenetwork infrastructure 100 through the access point. Consequently access to the network infrastructure can be prevented even though the name of the wireless network, the radio channel to be used, the encryption algorithm and the encryption key were known to the user. An example of an appropriate access point (AP) 3, 4A, 4B, 4C and 5 is the DWL-2100SP of the D-Link Systems Inc. - Let us examine, by way of example, how the customers may in accordance with the invention be provided with different services depending on to which access point the
network adapter 2A to 2G is configured to be connected. The same principle can be applied to create a desired number of different services. - The
network adapter units adapter units switch 6A of thenetwork infrastructure 100. The switches of theinfrastructure 100 are configured such that the customer terminals WS1 and WS2, which have a wireless connection through thenetwork adapter units access point 3 may have access to the disk or other network resources with aseparate server 8 and to the Internet connection through arouter 9. - The access points (AP) 4A, 4B and 4C are configured identically among one another. The
network adapter units access point 4A is connected to a port at theswitch 6A, theaccess point 4B is connected to a port at theswitch 6B and the access point 4C is connected to a port at theswitch 6C. The switches of theinfrastructure 100 are configured such that the customer terminals WS3 to WS6 having wireless connection through thenetwork adapter units access points router 9. - The network adapter 2G is configured such that it is logged in the access point (AP) 5 or in another similarly configured access point. The access point (AP) 5 is in turn connected to a port at the
switch 6C. The switches of theinfrastructure 100 are configured such that the customer terminal WS7, which is wirelessly connected through thenetwork adapter units access point 5 has access to the Internet at limited speed through therouter 9. The speed limitation of the Internet connection is set to the port of theswitch - The infrastructure shown in
FIG. 1 can be provided with a new secured local area network by providing a new equipment package according to the invention comprising a compatibly configured access point and an adapter unit. - A simple local area network infrastructure, such as a home network, can be established using a single equipment package, for instance the
adapter unit - The wireless local area network according to the invention is preferably arranged to prevent connections between customer terminals and to allow only the connection from the customer terminal to the Internet or another service intended thereto. A customer terminal can preferably not observe presence of other terminals in the wireless local area network. These measures increase the security of the wireless local area network.
- It is apparent to those skilled in the art that as technology progresses the basic idea of the invention can be implemented in various ways. The invention and the embodiments thereof are therefore not restricted to the above examples but may vary within the scope of the claims.
Claims (15)
1. A local area network comprising at least one access point (3, 4, 5) for connecting at least one customer computer (WS1 to WS7) over a wireless interface to the local area network, characterized in that the local area network comprises at least one adapter unit (2A to 2G) including a wireless network adapter part (21), which is in advance configured for a secure wireless connection with a predetermined access point (3, 4, 5) of the wireless network, and a wired network adapter part (22) to be connected to a wired network interface of the customer terminal (WS1 to WS7), and in that the access point (3, 4) is configured in advance to allow the access to a wireless local area network only from the compatibly configured adapter unit (2A to 2G).
2. A local area network as claimed in claim 1 , characterized in that the local area network comprises at least two differently configured access points (3, 4, 5) for different services and/or user groups, and in that each adapter unit (2A to 2G) is configured to be connected to an access point or access points with one type of configuration only.
3. A local area network as claimed in claim 1 or 2 , characterized in that access of the customer computer (WS1 to WS7) is prevented to the configuration data of the adapter unit (2A to 2G).
4. A local area network as claimed in claim 1 , 2 or 3 , characterized in that the configuration data of the access point (3, 4, 5) and the adapter unit (2A to 2G) comprise one or more of the following: a name of the wireless network, an encryption key index of the network, an encryption algorithm or method to be used, an encryption key and a radio channel to be used.
5. A local area network as claimed in claim 1 , 2 , 3 or 4 , characterized in that an IP address, a sub-network mask and/or a default gateway and name servers and possible WINS servers for the customer terminal (WS1 to WS7) are configured or retrieved through the wireless network to the wired network adapter part (22) of the adapter unit (2A to 2G), or the wired network adapter part (22) is arranged to automatically distribute them.
6. A local area network as claimed in any one of the previous claims, characterized in that the access points (3, 4, 5) are arranged to hide or to remove the name of the wireless network in their transmission, that the local area network comprises means for hiding and securing the customer terminals and the connections thereof from one another.
7. A local area network as claimed in any one of the previous claims, characterized in that at least one access point (3, 4, 5) comprises a device address filter for allowing connection to the network for only the adapter units provided with particular device addresses.
8. A local area network as claimed in any one of the previous claims, characterized in that the local area network comprises a server (7) for distributing one or more of the following data items through the access point and the adapter unit to the customer terminal; an IP address, a subnetwork mask and/or a default gateway and name servers and WINS servers.
9. A local area network as claimed in any one of the previous claims, characterized in that the local area network comprises means (6A to 6D), preferably one or more switches for providing an Internet connection and/or a memory resource and/or another network resource to the customer computer (WS1 to WS7) according to the access point (3, 4, 5) used for connection.
10. A local area network as claimed in claim 9 , characterized in that the means (6A to 6D) comprise means for creating virtual networks of the access points (3, 4, 5) to the services and/or network resources addressed thereto.
11. An adapter unit for connecting a computer (WS1 to WS7) over a wireless interface to an access point (3, 4, 5) of a wireless local area network, characterized in that an adapter unit (2A to 2G) comprises both a wired network adapter part (22) to be connected to a wired network interface of the computer (WS1 to WS7) and a wireless network adapter part (21), which is configured in advance by the supplier of the adapter unit to provide a secure wireless connection only to a predetermined access point (3, 4, 5) compatibly configured in advance by the supplier of the adapter unit.
12. Equipment for a wireless local area network, characterized in that the equipment comprise at least one adapter unit (2A to 2G) including a wired network adapter part (22) to be connected to a wired network interface of a computer (WS1 to WS7), and a wireless network adapter part (21), and a wireless network access point (3, 4, 5), and that the access point (3, 4, 5) and said at least one adapter unit are compatibly configured in advance by the supplier of the adapter unit to provide a wireless secure connection only with one another.
13. Equipment as claimed in claim 12 , characterized in that the configuration data of the access point (3, 4, 5) and the at least one adapter unit (2A to 2G) include one or more of the following: a name of the wireless network, an encryption key index of the network, an encryption algorithm or method, an encryption key and a radio channel.
14. Equipment as claimed in claim 12 or 13 , characterized in that the access point (3, 4, 5) comprises a hardware address filter for allowing connection for only the adapter units provided with particular hardware addresses.
15. Equipment as claimed in claim 12 , 13 or 14 , characterized in that the access point (3, 4, 5) is arranged to hide or remove the name of the wireless network during transmission, and that the equipment comprise means for hiding and securing the customer terminals and the connections thereof from one another.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20050292U FI6974U1 (en) | 2005-09-15 | 2005-09-15 | Wireless LAN |
FIU20050292 | 2005-09-15 | ||
FI20055549 | 2005-10-10 | ||
FI20055549A FI122050B (en) | 2005-09-15 | 2005-10-10 | Wireless local area network, adapter unit and facility |
PCT/FI2006/000304 WO2007031597A1 (en) | 2005-09-15 | 2006-09-14 | Wireless local area network, adapter unit and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100265845A1 true US20100265845A1 (en) | 2010-10-21 |
Family
ID=35185258
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/991,965 Abandoned US20100265845A1 (en) | 2005-09-15 | 2006-09-14 | Wireless Local Area Network, Adapter Unit and Equipment |
Country Status (4)
Country | Link |
---|---|
US (1) | US20100265845A1 (en) |
EP (1) | EP1935138A4 (en) |
FI (1) | FI122050B (en) |
WO (1) | WO2007031597A1 (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080285575A1 (en) * | 2007-03-01 | 2008-11-20 | Meraki Networks, Inc. | System and Method For Remote Monitoring And Control Of Network Devices |
US20100235621A1 (en) * | 2009-03-10 | 2010-09-16 | Winkler david b | Method of securely pairing devices with an access point for an ip-based wireless network |
US20110299686A1 (en) * | 2009-02-25 | 2011-12-08 | Saboff Michael L | Wireless device setup |
US20120151023A1 (en) * | 2010-12-09 | 2012-06-14 | Samsung Electronics Co., Ltd. | Image forming device, host device, and connecting methods thereof |
US20120166804A1 (en) * | 2006-12-22 | 2012-06-28 | Brijesh Nambiar | VLAN Tunneling |
JP2012239120A (en) * | 2011-05-13 | 2012-12-06 | Ricoh Co Ltd | Network system |
US20130223230A1 (en) * | 2012-02-27 | 2013-08-29 | Qualcomm Incorporated | Serving Multiple Subscribers Through a Software-Enabled Access Point |
US8619545B2 (en) | 2008-07-17 | 2013-12-31 | T-Mobile Usa, Inc. | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network based on landline telephone detection |
US8621071B1 (en) * | 2010-06-23 | 2013-12-31 | Marvell International Ltd. | Method and apparatus for automatically selecting an access point |
US8774148B2 (en) | 2009-02-27 | 2014-07-08 | T-Mobile Usa, Inc. | System and method for provisioning telecommunications services between an access point and a telecommunications network and providing missing information notification |
US8782740B1 (en) * | 2009-01-28 | 2014-07-15 | Crimson Corporation | Systems and methods for detection of unauthorized or unsecured access points |
US8885635B2 (en) | 2008-07-17 | 2014-11-11 | T-Mobile Usa, Inc. | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier |
US20150163670A1 (en) * | 2005-06-22 | 2015-06-11 | Odyssey Wireless, Inc. | Systems/methods of conducting a financial transaction using a smartphone |
US20150333965A1 (en) * | 2014-05-19 | 2015-11-19 | Comcast Cable Communications, Llc | Device Provisioning |
US20160044036A1 (en) * | 2014-08-07 | 2016-02-11 | Arris Enterprises, Inc. | Managing private and public service set utilization |
US9301155B2 (en) | 2006-10-23 | 2016-03-29 | T-Mobile Usa, Inc. | System and method for managing access point functionality and configuration |
US9374746B1 (en) | 2008-07-07 | 2016-06-21 | Odyssey Wireless, Inc. | Systems/methods of spatial multiplexing |
US9462411B2 (en) | 2008-11-04 | 2016-10-04 | Telcom Ventures, Llc | Mobile device mode enablement responsive to a proximity criterion |
US9565185B2 (en) | 2014-11-24 | 2017-02-07 | At&T Intellectual Property I, L.P. | Facilitation of seamless security data transfer for wireless network devices |
US9641202B2 (en) | 2005-06-22 | 2017-05-02 | Odyssey Wireless, Inc. | Systems/methods of carrier aggregation |
USRE47633E1 (en) * | 2005-06-22 | 2019-10-01 | Odyssey Wireless Inc. | Systems/methods of conducting a financial transaction using a smartphone |
US11641502B2 (en) | 2016-12-22 | 2023-05-02 | Sonifi Solutions, Inc. | Methods and systems for implementing legacy remote and keystroke redirection |
US11671651B2 (en) | 2015-09-30 | 2023-06-06 | Sonifi Solutions, Inc. | Methods and systems for enabling communications between devices |
US11689563B1 (en) * | 2021-10-22 | 2023-06-27 | Nudge Security, Inc. | Discrete and aggregate email analysis to infer user behavior |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020007407A1 (en) * | 2000-07-12 | 2002-01-17 | Klein John Raymond | Auto configuration of portable computers for use in wireless local area networks |
US20020165990A1 (en) * | 2001-05-03 | 2002-11-07 | Reefedge, Inc. | Method and system for adapting short-range wireless access points for participation in a coordinated networked environment |
US6512755B1 (en) * | 1997-12-29 | 2003-01-28 | Alcatel Usa Sourcing, L.P. | Wireless telecommunications access system |
US20040068653A1 (en) * | 2002-10-08 | 2004-04-08 | Fascenda Anthony C. | Shared network access using different access keys |
US20040085944A1 (en) * | 2002-11-04 | 2004-05-06 | Boehm Lawrence D. | Portable wireless internet gateway |
US20040214570A1 (en) * | 2003-04-28 | 2004-10-28 | Junbiao Zhang | Technique for secure wireless LAN access |
US20050048997A1 (en) * | 2003-09-02 | 2005-03-03 | Mike Grobler | Wireless connectivity module |
US20050135315A1 (en) * | 2003-12-18 | 2005-06-23 | Sinha Suman K. | Applying wireless network connection profiles using windows management instrumentation |
US20050152305A1 (en) * | 2002-11-25 | 2005-07-14 | Fujitsu Limited | Apparatus, method, and medium for self-organizing multi-hop wireless access networks |
US7002995B2 (en) * | 2001-06-14 | 2006-02-21 | At&T Corp. | Broadband network with enterprise wireless communication system for residential and business environment |
US7010002B2 (en) * | 2001-06-14 | 2006-03-07 | At&T Corp. | Broadband network with enterprise wireless communication method for residential and business environment |
US20060084417A1 (en) * | 2002-07-10 | 2006-04-20 | Diego Melpignano | Interface selection from multiple networks |
US20070250910A1 (en) * | 2005-02-08 | 2007-10-25 | Airpatrol Corporation | Network Security Enhancement Methods, Apparatuses, System, Media, Signals and Computer Programs |
US7363358B2 (en) * | 2002-05-09 | 2008-04-22 | Gateway Inc. | Transporting a WAN configuration from a PC to a residential gateway |
US20080130572A1 (en) * | 2005-01-31 | 2008-06-05 | Junbiao Zhang | Local Mobility Solution With Wired and Wireless Interface Switching |
US7424024B2 (en) * | 2000-01-31 | 2008-09-09 | 3E Technologies International, Inc. | Broadband communications access device |
US7634230B2 (en) * | 2002-11-25 | 2009-12-15 | Fujitsu Limited | Methods and apparatus for secure, portable, wireless and multi-hop data networking |
US20100074239A1 (en) * | 2005-04-11 | 2010-03-25 | Joseph Born | Wireless Detector and Adapter |
US7715834B2 (en) * | 2004-12-01 | 2010-05-11 | Borther Kogyo Kabushiki Kaisha | Wireless communication system, device, and method of setting up wireless communication adapter |
US7733772B2 (en) * | 2006-01-25 | 2010-06-08 | Intel Corporation | Dynamic selection of communication links in a mixed network |
US7990985B2 (en) * | 2000-01-31 | 2011-08-02 | 3E Technologies International, Inc. | Broadband communications access device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004135134A (en) * | 2002-10-11 | 2004-04-30 | Tdk Corp | Adapter for wireless communication |
-
2005
- 2005-10-10 FI FI20055549A patent/FI122050B/en not_active IP Right Cessation
-
2006
- 2006-09-14 WO PCT/FI2006/000304 patent/WO2007031597A1/en active Application Filing
- 2006-09-14 EP EP06794080A patent/EP1935138A4/en not_active Withdrawn
- 2006-09-14 US US11/991,965 patent/US20100265845A1/en not_active Abandoned
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6512755B1 (en) * | 1997-12-29 | 2003-01-28 | Alcatel Usa Sourcing, L.P. | Wireless telecommunications access system |
US7990985B2 (en) * | 2000-01-31 | 2011-08-02 | 3E Technologies International, Inc. | Broadband communications access device |
US7424024B2 (en) * | 2000-01-31 | 2008-09-09 | 3E Technologies International, Inc. | Broadband communications access device |
US20020007407A1 (en) * | 2000-07-12 | 2002-01-17 | Klein John Raymond | Auto configuration of portable computers for use in wireless local area networks |
US20020165990A1 (en) * | 2001-05-03 | 2002-11-07 | Reefedge, Inc. | Method and system for adapting short-range wireless access points for participation in a coordinated networked environment |
US7010002B2 (en) * | 2001-06-14 | 2006-03-07 | At&T Corp. | Broadband network with enterprise wireless communication method for residential and business environment |
US7002995B2 (en) * | 2001-06-14 | 2006-02-21 | At&T Corp. | Broadband network with enterprise wireless communication system for residential and business environment |
US7363358B2 (en) * | 2002-05-09 | 2008-04-22 | Gateway Inc. | Transporting a WAN configuration from a PC to a residential gateway |
US20060084417A1 (en) * | 2002-07-10 | 2006-04-20 | Diego Melpignano | Interface selection from multiple networks |
US20040068653A1 (en) * | 2002-10-08 | 2004-04-08 | Fascenda Anthony C. | Shared network access using different access keys |
US20040085944A1 (en) * | 2002-11-04 | 2004-05-06 | Boehm Lawrence D. | Portable wireless internet gateway |
US20050152305A1 (en) * | 2002-11-25 | 2005-07-14 | Fujitsu Limited | Apparatus, method, and medium for self-organizing multi-hop wireless access networks |
US7634230B2 (en) * | 2002-11-25 | 2009-12-15 | Fujitsu Limited | Methods and apparatus for secure, portable, wireless and multi-hop data networking |
US20040214570A1 (en) * | 2003-04-28 | 2004-10-28 | Junbiao Zhang | Technique for secure wireless LAN access |
US20050048997A1 (en) * | 2003-09-02 | 2005-03-03 | Mike Grobler | Wireless connectivity module |
US20050135315A1 (en) * | 2003-12-18 | 2005-06-23 | Sinha Suman K. | Applying wireless network connection profiles using windows management instrumentation |
US7715834B2 (en) * | 2004-12-01 | 2010-05-11 | Borther Kogyo Kabushiki Kaisha | Wireless communication system, device, and method of setting up wireless communication adapter |
US20080130572A1 (en) * | 2005-01-31 | 2008-06-05 | Junbiao Zhang | Local Mobility Solution With Wired and Wireless Interface Switching |
US20070250910A1 (en) * | 2005-02-08 | 2007-10-25 | Airpatrol Corporation | Network Security Enhancement Methods, Apparatuses, System, Media, Signals and Computer Programs |
US20100074239A1 (en) * | 2005-04-11 | 2010-03-25 | Joseph Born | Wireless Detector and Adapter |
US7733772B2 (en) * | 2006-01-25 | 2010-06-08 | Intel Corporation | Dynamic selection of communication links in a mixed network |
Cited By (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9641202B2 (en) | 2005-06-22 | 2017-05-02 | Odyssey Wireless, Inc. | Systems/methods of carrier aggregation |
US9392451B2 (en) * | 2005-06-22 | 2016-07-12 | Odyssey Wireless, Inc. | Systems/methods of conducting a financial transaction using a smartphone |
US20150163670A1 (en) * | 2005-06-22 | 2015-06-11 | Odyssey Wireless, Inc. | Systems/methods of conducting a financial transaction using a smartphone |
USRE47633E1 (en) * | 2005-06-22 | 2019-10-01 | Odyssey Wireless Inc. | Systems/methods of conducting a financial transaction using a smartphone |
US9705535B2 (en) | 2005-06-22 | 2017-07-11 | Odyssey Wireless, Inc. | Systems/methods of carrier aggregation |
US9301155B2 (en) | 2006-10-23 | 2016-03-29 | T-Mobile Usa, Inc. | System and method for managing access point functionality and configuration |
US10447533B2 (en) | 2006-10-23 | 2019-10-15 | T-Mobile Usa, Inc. | System and method for managing access point functionality and configuration |
US9843480B2 (en) | 2006-10-23 | 2017-12-12 | T-Mobile Usa, Inc. | System and method for managing access point functionality and configuration |
US20120166804A1 (en) * | 2006-12-22 | 2012-06-28 | Brijesh Nambiar | VLAN Tunneling |
US8339991B2 (en) * | 2007-03-01 | 2012-12-25 | Meraki, Inc. | Node self-configuration and operation in a wireless network |
US20080304427A1 (en) * | 2007-03-01 | 2008-12-11 | Meraki Networks, Inc. | Node Self-Configuration And Operation In A Wireless Network |
US8477771B2 (en) | 2007-03-01 | 2013-07-02 | Meraki Networks, Inc. | System and method for remote monitoring and control of network devices |
US9559891B2 (en) | 2007-03-01 | 2017-01-31 | Cisco Technology, Inc. | System and method for hosted network management |
US20080294759A1 (en) * | 2007-03-01 | 2008-11-27 | Meraki Networks, Inc. | System and Method For Hosted Network Management |
US8527662B2 (en) | 2007-03-01 | 2013-09-03 | Meraki, Inc. | System and method for remote monitoring and control of network devices |
US8595357B2 (en) | 2007-03-01 | 2013-11-26 | Cisco Technology, Inc. | System and method for hosted network management |
US20080285575A1 (en) * | 2007-03-01 | 2008-11-20 | Meraki Networks, Inc. | System and Method For Remote Monitoring And Control Of Network Devices |
US20080288614A1 (en) * | 2007-03-01 | 2008-11-20 | Meraki Networks, Inc. | Client Addressing And Roaming In A Wireless Network |
US9237063B2 (en) | 2007-03-01 | 2016-01-12 | Cisco Technology, Inc. | System and method for remote monitoring and control of network devices |
US9210034B2 (en) | 2007-03-01 | 2015-12-08 | Cisco Technology, Inc. | Client addressing and roaming in a wireless network |
US9374746B1 (en) | 2008-07-07 | 2016-06-21 | Odyssey Wireless, Inc. | Systems/methods of spatial multiplexing |
US8619545B2 (en) | 2008-07-17 | 2013-12-31 | T-Mobile Usa, Inc. | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network based on landline telephone detection |
US9363740B2 (en) | 2008-07-17 | 2016-06-07 | T-Mobile Usa, Inc. | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier |
US8885635B2 (en) | 2008-07-17 | 2014-11-11 | T-Mobile Usa, Inc. | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier |
US11304118B2 (en) | 2008-11-04 | 2022-04-12 | Telcom Ventures Llc | Method and apparatus for sensing products for purchase |
US10660015B2 (en) | 2008-11-04 | 2020-05-19 | Telcom Ventures, Llc | Mobile device mode enablement responsive to a proximity criterion |
US11924743B2 (en) | 2008-11-04 | 2024-03-05 | Telcom Ventures Llc | Systems/methods of establishing a capability, and using the capability, to execute financial transactions by a smartphone |
US11937172B1 (en) | 2008-11-04 | 2024-03-19 | Telcom Ventures Llc | Systems/methods of a two-step process in establishing a capability, and using the capability, to execute a financial transaction by a smartphone |
US9832708B2 (en) | 2008-11-04 | 2017-11-28 | Telcom Ventures, Llc | Mobile device mode enablement responsive to a proximity criterion |
US11770756B2 (en) | 2008-11-04 | 2023-09-26 | Telcom Ventures Llc | Mobile device mode enablement/disablement responsive to sensing a physiological parameter |
US10219199B2 (en) | 2008-11-04 | 2019-02-26 | Telcom Ventures, Llc | Mobile device mode enablement responsive to a proximity criterion |
US10674432B2 (en) | 2008-11-04 | 2020-06-02 | Telcom Ventures, Llc | Mobile device mode enablement responsive to a proximity criterion |
US9462411B2 (en) | 2008-11-04 | 2016-10-04 | Telcom Ventures, Llc | Mobile device mode enablement responsive to a proximity criterion |
US12028793B2 (en) | 2008-11-04 | 2024-07-02 | Telcom Ventures Llc | Systems/methods of establishing a capability, and then using the capability, to perform a financial transaction by a smartphone |
US8782740B1 (en) * | 2009-01-28 | 2014-07-15 | Crimson Corporation | Systems and methods for detection of unauthorized or unsecured access points |
US20110299686A1 (en) * | 2009-02-25 | 2011-12-08 | Saboff Michael L | Wireless device setup |
US8724813B2 (en) * | 2009-02-25 | 2014-05-13 | Hewlett-Packard Development Company, L.P. | Wireless device setup |
US8774148B2 (en) | 2009-02-27 | 2014-07-08 | T-Mobile Usa, Inc. | System and method for provisioning telecommunications services between an access point and a telecommunications network and providing missing information notification |
US8484457B2 (en) * | 2009-03-10 | 2013-07-09 | T-Mobile Usa, Inc. | Method of securely pairing devices with an access point for an IP-based wireless network |
US20100235621A1 (en) * | 2009-03-10 | 2010-09-16 | Winkler david b | Method of securely pairing devices with an access point for an ip-based wireless network |
US8621071B1 (en) * | 2010-06-23 | 2013-12-31 | Marvell International Ltd. | Method and apparatus for automatically selecting an access point |
US20120151023A1 (en) * | 2010-12-09 | 2012-06-14 | Samsung Electronics Co., Ltd. | Image forming device, host device, and connecting methods thereof |
US8769064B2 (en) * | 2010-12-09 | 2014-07-01 | Samsung Electronics Co., Ltd. | System using wired interface to configure wireless connection between host and image forming device |
CN102546851A (en) * | 2010-12-09 | 2012-07-04 | 三星电子株式会社 | Image forming device, host device and connecting methods thereof |
JP2012239120A (en) * | 2011-05-13 | 2012-12-06 | Ricoh Co Ltd | Network system |
US20130223230A1 (en) * | 2012-02-27 | 2013-08-29 | Qualcomm Incorporated | Serving Multiple Subscribers Through a Software-Enabled Access Point |
US9590857B2 (en) * | 2014-05-19 | 2017-03-07 | Comcast Cable Communications, Llc | Device provisioning |
US12081408B2 (en) | 2014-05-19 | 2024-09-03 | Comcast Cable Communications, Llc | Device provisioning |
US10917306B2 (en) | 2014-05-19 | 2021-02-09 | Comcast Cable Communications, Llc | Device provisioning |
US11706094B2 (en) | 2014-05-19 | 2023-07-18 | Comcast Cable Communications, Llc | Device provisioning |
US10148520B2 (en) | 2014-05-19 | 2018-12-04 | Comcast Cable Communications, Llc | Device provisioning |
US20150333965A1 (en) * | 2014-05-19 | 2015-11-19 | Comcast Cable Communications, Llc | Device Provisioning |
US9912667B2 (en) * | 2014-08-07 | 2018-03-06 | Arris Enterprises Llc | Managing private and public service set utilization |
US9674186B2 (en) * | 2014-08-07 | 2017-06-06 | Arris Enterprises, Inc. | Managing private and public service set utilization |
US20160044036A1 (en) * | 2014-08-07 | 2016-02-11 | Arris Enterprises, Inc. | Managing private and public service set utilization |
US10070312B2 (en) | 2014-11-24 | 2018-09-04 | At&T Intellectual Property I, L.P. | Facilitation of seamless security data transfer for wireless network devices |
US10616766B2 (en) | 2014-11-24 | 2020-04-07 | At&T Intellectual Property I, L.P. | Facilitation of seamless security data transfer for wireless network devices |
US9565185B2 (en) | 2014-11-24 | 2017-02-07 | At&T Intellectual Property I, L.P. | Facilitation of seamless security data transfer for wireless network devices |
US11671651B2 (en) | 2015-09-30 | 2023-06-06 | Sonifi Solutions, Inc. | Methods and systems for enabling communications between devices |
US12101527B2 (en) | 2015-09-30 | 2024-09-24 | Sonifi Solutions, Inc. | Methods and systems for enabling communications between devices |
US11641502B2 (en) | 2016-12-22 | 2023-05-02 | Sonifi Solutions, Inc. | Methods and systems for implementing legacy remote and keystroke redirection |
US12063406B2 (en) | 2016-12-22 | 2024-08-13 | Sonifi Solutions, Inc. | Methods and systems for implementing legacy remote and keystroke redirection |
US11689563B1 (en) * | 2021-10-22 | 2023-06-27 | Nudge Security, Inc. | Discrete and aggregate email analysis to infer user behavior |
US11799884B1 (en) | 2021-10-22 | 2023-10-24 | Nudge Security, Inc. | Analysis of user email to detect use of Internet services |
Also Published As
Publication number | Publication date |
---|---|
FI122050B (en) | 2011-07-29 |
EP1935138A1 (en) | 2008-06-25 |
FI20055549A0 (en) | 2005-10-10 |
FI20055549A (en) | 2007-03-16 |
WO2007031597A1 (en) | 2007-03-22 |
EP1935138A4 (en) | 2009-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20100265845A1 (en) | Wireless Local Area Network, Adapter Unit and Equipment | |
US7882247B2 (en) | Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments | |
EP1422875B1 (en) | Wireless network handoff key | |
EP1935143B1 (en) | Virtual lan override in a multiple bssid mode of operation | |
JP3984993B2 (en) | Method and system for establishing a connection through an access network | |
US7688981B2 (en) | Network partitioning using encryption | |
US8555344B1 (en) | Methods and systems for fallback modes of operation within wireless computer networks | |
US7725707B2 (en) | Server, VPN client, VPN system, and software | |
US20120072727A1 (en) | Multi-isp controlled access to ip networks, based on third-party operated untrusted access stations | |
US7881667B2 (en) | Methods and apparatus for secure, portable, wireless and multi-hop data networking | |
CN110087236A (en) | For establishing the agreement of secure communication session by wireless network and anonymous host | |
US20020090089A1 (en) | Methods and apparatus for secure wireless networking | |
US20060031936A1 (en) | Encryption security in a network system | |
US20070127500A1 (en) | System, device, method and software for providing a visitor access to a public network | |
KR20050084926A (en) | Radio lan access authentication system | |
WO2005119964A1 (en) | Method for establishing a security association between a wireless access point and a wireless node in a upnp environment | |
JPH07107083A (en) | Cipher communication system | |
JP2005204086A (en) | Mobile radio communications system, mobile radio terminal, virtual private network repeater, and connection authenticating server | |
JP2004533749A (en) | Hybrid network | |
JP2004312257A (en) | Base station, repeating device and communication system | |
EP1466434A1 (en) | Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments | |
Kalvan | Designing and planning a network for a restaurant franchise | |
KR20030050550A (en) | Simple IP virtual private network service in PDSN system | |
YAMAI et al. | A user authentication system for secure wireless communication | |
Ibrahim | Investigating the Effectiveness and Performance of WPA_PSK (Pre-Shared Key) and WPA_RADIUS Server in Wireless Network Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NETWORK SERVICES FINLAND OY, FINLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LAMPEN, PATRIK;REEL/FRAME:022074/0869 Effective date: 20080409 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |